Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,256,515 papers from all fields of science
Search
Sign In
Create Free Account
Code integrity
Code integrity is a measurement used in software testing. It measures the how high is the source code's quality when it is passed on to the QA, and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Let's Face It: Faceted Values for Taint Tracking
Daniel Schoepe
,
Musard Balliu
,
F. Piessens
,
A. Sabelfeld
European Symposium on Research in Computer…
2016
Corpus ID: 37791056
Taint tracking has been successfully deployed in a range of security applications to track data dependencies in hardware and…
Expand
Highly Cited
2014
Highly Cited
2014
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture
Xinyang Ge
,
H. Vijayakumar
,
T. Jaeger
ArXiv
2014
Corpus ID: 6153605
Many smartphones now deploy conventional operating systems, so the rootkit attacks so prevalent on desktop and server systems are…
Expand
Highly Cited
2013
Highly Cited
2013
Autonomic Recovery: HyperCheck: A Hardware-Assisted Integrity Monitor
Jiang Wang
,
Angelos Stavron
,
Anup K. Ghosh
2013
Corpus ID: 28296276
Abstract : Over the past few years, virtualization has been employed to environments ranging from densely populated cloud…
Expand
Highly Cited
2010
Highly Cited
2010
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
Zhi Wang
,
Xuxian Jiang
IEEE Symposium on Security and Privacy
2010
Corpus ID: 11031256
Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and…
Expand
Highly Cited
2009
Highly Cited
2009
HIMA: A Hypervisor-Based Integrity Measurement Agent
Ahmed M. Azab
,
P. Ning
,
E. C. Sezer
,
Xiaolan Zhang
Asia-Pacific Computer Systems Architecture…
2009
Corpus ID: 10884381
Integrity measurement is a key issue in building trust in distributed systems. A good solution to integrity measurement has to…
Expand
Highly Cited
2009
Highly Cited
2009
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
R. Hund
,
Thorsten Holz
,
F. Freiling
USENIX Security Symposium
2009
Corpus ID: 7016714
Protecting the kernel of an operating system against attacks, especially injection of malicious code, is an important factor for…
Expand
Highly Cited
2008
Highly Cited
2008
Remote attestation on legacy operating systems with trusted platform modules
Dries Schellekens
,
B. Wyseur
,
B. Preneel
Science of Computer Programming
2008
Corpus ID: 1982231
Highly Cited
2007
Highly Cited
2007
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
Arvind Seshadri
,
M. Luk
,
Ning Qu
,
A. Perrig
Symposium on Operating Systems Principles
2007
Corpus ID: 89864
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that…
Expand
Highly Cited
2006
Highly Cited
2006
TTAnalyze: A Tool for Analyzing Malware
U. Bayer
2006
Corpus ID: 11273952
Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or…
Expand
Highly Cited
2005
Highly Cited
2005
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
Arvind Seshadri
,
M. Luk
,
A. Perrig
,
L. V. Doorn
,
P. Khosla
Symposium on Operating Systems Principles
2005
Corpus ID: 9960430
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE